Author: simonmackay

Moving towards a converged smart-home experience

Article

Nest Learning Thermostat courtesy of Nest Labs

The smart home is moving towards a converged approach for managing the many protocols associated with controlling devices like these room thermostats

Interoperability: CHoIP, Zigbee, Z-Wave, OCF } Parks Perspectives (Parks Associates)

My Comments

There are at least four key smart-home standards (CHoIP, Zigbee, Z-Wave and Open Connectivity Foundation) that work across multiple levels of the protocol stack for this kind of usage. Most of these have backing from some of Silicon Valley’s big names like Amazon, Apple and Google and some will work on particular low-power wireless transports like Zigbee and Z-Wave.

The problem that will come about is the apparent disparity between these standards both at transport / media layers and at the higher layers like the application layer. What will come about is to achieve software-level convergence between the various standards, typically to provide some sort of logical interlinking between them.

This will be worked on for both device-to-device and cloud-to-cloud use cases. The former arrangement would best describe where a device like a sensor or control device is simply reporting to another device like a heating system while the latter would describe setups that liaise with online services but could represent multiple smart-home systems within the same property.

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

It is more so as smart speakers of the Amazon Echo kind become part of the smart home

A question that will come up is having a standard to logically identify devices by their function, capabilities and attributes in a consistent manner no matter the protocol and vendor. This includes exchanging commands, status reports and events between the devices and others dependent on them.

As well the reality for most of us would be to “start small” and build out a smart-home setup. This may involve dealing with room-based or function-based logical clusters with multiple endpoint devices reporting to cluster-based “hub” devices. In this situation, these “hubs” may end up having to share information with each other to have the setup work as a larger one.

A good example of this may be a smart speaker based on a particular voice-driven home assistant platform that also has home-automation hub functionality being brought in to one’s home even while there is the home-automation central unit facilitated by the end-user’s telco as part of a multiple-play Internet-service deal already in service.

The same situation will also come about with smart-home devices having increased processing power and being able to do more; as well as factoring in a mix of older and newer devices that satisfy particular needs.

What I see that could be happening is the creation of a few shared-code or open-source software stacks that encompass the main home-automation protocols. It will then allow for a wider net to be cast when it comes to developing those smart-home solutions due to the ability for software developers to concentrate on the “rest of the package” for their solution without “reinventing the wheel”.

Safe computing practices in the coronavirus age

Coronavirus Covid-19

The coronavirus plague is having us at home, inside and online more….
(iStock by Getty Images)

The Covid-19 coronavirus plague is changing our habits more and more as we stay at home to avoid the virus or avoid spreading it onwards. Now we are strongly relying on our home networks and the Internet to perform our work, continue studying and connect with others in our social circles.

But this state of affairs is drawing out its own cyber-security risks, with computing devices being vulnerable to malware and the existence of hastily-written software being preferred of tasks like videoconferencing. Not to mention the risk of an increasing flow of fake news and disinformation about this disease.

What can we do?

General IT security

But we need to be extra vigilant about our data security and personal privacy

The general IT security measures are very important even in this coronavirus age. Here, you need to make sure that all the software on your computing devices, including their operating systems are up-to-date and have the latest patches. It also applies to your network, TV set-top and Internet-of-Things hardware where you need to make sure the firmware is up-to-date. The best way to achieve this is to have the devices automatically download and install the revised software themselves.

As well, managing the passwords for our online services and our devices properly prevents the risk of data and identity theft. It may even be a good idea to use a password vault program to manage our passwords which may prevent us from reusing them across services.  Similarly using a word processor to keep a list of your passwords which is saved on removeable media and printed out, with both the hard and electronic copy kept in a secure location may also work wonders here.

Make sure that your computer is running a desktop / endpoint security program, even if it is the one that is part of the operating system. Similarly, using an on-demand scanning tool like Malwarebytes can work as a way to check for questionable software. As well, you may have to check the software that is installed on all of the computing devices is what you are using and even verify with multiple knowledgeable people if that program that is the “talk of the town” should be on your computer.

If you are signing up with new online services, it may even be a better idea to implement social sign-on with established credential pools like Google, Facebook or Microsoft. These setups implement a token between the credential pool and the online service as the authentication factor rather than a separate username and password that you create.

As well, you will be using the Webcam more frequently on your computing devices. The security issue with the Webcam and microphone is more important with computing setups that have the Webcam integrated in the computer or monitor, like with portable computing devices, “all-in-one” computers or monitors equipped with Webcams.

Here, you need to be careful of which programs are having access to the Webcam and microphone on your device. Here, if newly-installed software asks for use of your camera or microphone and it is out of touch with the way the software works, deny access to the camera or microphone when it asks for their use.

If you install a health-department-supplied tracking app as part of your government’s contact-tracing and disease-management efforts, remember to remove this app as soon as the coronavirus crisis is over. Doing this will protect your privacy once there is no real need to manage the disease.

Email and messaging security

Your email and messaging platforms will become an increased security risk at this time thanks to phishing including business email compromise. I have covered this issue in a previous article after helping someone reclaim their email service account after a successful phishing attempt.

An email or message would be a phishing attempt if the email isn’t commensurate with proper business writing standards for your country, has a sense of urgency about it and is too good to be true. Once you receive these emails, it is prudent to report them then delete them forthwith.

In the case of email addresses from official organisations, make sure that the domain name represents the organisation’s proper domain name. This is something that is exactly like the domain name they would use for their Web presence, although email addresses may have the domain name part of the address following the “ @ “ symbol prepended with a server identifier like “mail” or “email”. As well, there should be nothing appended to the domain name.

Also, be familiar with particular domain-name structures for official organisation clusters like the civil / public service, international organisations and academia when you open email or surf the Web. These will typically use protected high-level domain name suffixes like “.gov”, “.int” or “.edu” and won’t use common domain name suffixes like “ .com “. This will help with identifying whether a site or a sender is the proper authority or not.

Messaging and video-conferencing

Increasingly as we stay home due to the risk of catching or spreading the coronavirus plague, we are relying on messaging and video-conferencing software more frequently to communicate with each other. For example, families and communities are using video-conferencing software like Zoom or Skype to make a virtual “get-together” with each other thanks to these platforms’ support for many-to-many videocalls.

But as we rely on this software more, we need to make sure that our privacy, business confidentiality and data security is protected. This is becoming more important as we engage with our doctors, whether they be general practitioners or specialists, “over the wire” and reveal our medical issues to them that way.

If you value privacy, look towards using an online communications platform that implements end-to-end encryption. Infact, most of the respected “over-the-top” communications platforms like WhatsApp, Viber, Skype and iMessage offer this feature for 1:1 conversations between users on the same platform. Some, like WhatsApp and Viber offer this same feature for group conversations between users on that same platform.

Video-conferencing software like Zoom and Skype

When you are hosting a video-conference using Zoom, Skype or similar platforms, be familiar with any meeting-setup and meeting-management features that the platform offers. If the platform uses a Weblink to join a video-conference that you can share, use email or a messaging platform to share that link with potential participants. Avoid posting this on the Social Web so you keep gatecrashers from your meeting or class.

As well, if the platform supports password-protected meeting entry, use this feature to limit who can join the meeting. Here, it is also a good idea to send the password as a separate message from the meeting’s Weblink.

Some platforms like Zoom offer a waiting-room function which requires potential participants to wait and be vetted by the conference’s moderator before they can participate. As well these platforms may have a meeting-lockout so no more people can participate in the video-conference. Here, you use this function when all the participants that you expect are present in the meeting.

You need to regulate the screen sharing feature that your platform offers which allows meeting participants to share currently-running app or desktop user interfaces. Here, you may have the ability to limit this function to the moderator’s computer or a specified participant’s computer. Here this will prevent people from showing offensive imagery or videos to all the meeting’s participants. As well, you may also need to regulate access to any file-sharing functionality that the platform offers in order to prevent the video conference becoming a vector for spreading malware or offensive material.

Fake news and disinformation

Just like with the elections that count, the coronavirus issue has brought about its fair share of fake news and disinformation.

Here, I would recommend that you use trusted news sources like the respected public-service broadcasters for information about this plague. As well, I would recommend that you visit respected health-information sites including those offered “from the horse’s mouth” by local, regional or national government agencies for the latest information.

As well, trust your “gut reaction” when it comes to material that is posted online about the coronavirus plague, including the availability of necessary food or medical supplies. Here, he careful of content that is “out of reality” or plays on your emotions. The same attitude should also apply when it comes to buying essential supplies online and you are concerned about the availability and price of these supplies.

Conclusion

As we spend more time indoors and online thanks to the coronavirus, we need to keep our computing equipment including our tablets and smartphones running securely to protect our data and our privacy.

What do I mean by a native client for an online service?

Facebook Messenger Windows 10 native client

Facebook Messenger – now native on Windows 10

With the increasing number of online services including cloud and “as-a-service” computing arrangements, there has to be a way for users to gain access to these services.

Previously, the common way was to use a Web-based user interface where the user has to run a Web browser to gain access to the online service. The user will see the Web browser’s interface elements, also known as “chrome” as part of the user experience. This used to be very limiting when it came to functionality but various revisions have allowed for a similar kind of functionality to regular apps.

Dropbox native client view for Windows 8 Desktop

Dropbox native client view for Windows 8 Desktop- taking advantage of what Windows Explorer offers

A variant on this theme is a “Web app” which provides a user interface without the Web browser’s interface elements. But the Web browser works as an interpreter between the online service and the user interface although the user doesn’t see it as that. It is appealing as an approach to writing online service clients due to the idea of “write once run anywhere”.

Another common approach is to write an app that is native to a particular computing platform and operating system. These apps, which I describe as “native clients” are totally optimised in performance and functionality for that computing platform. This is because there isn’t the need for overhead associated with a Web browser needing to interpret code associated with a Web page. As well, the software developer can take advantage of what the computing platform and operating system offers even before the Web browser developers build support for the function in to their products.

There are some good examples of online-service native clients having an advantage over Web apps or Web pages. One of these is messaging and communications software. Here, a user may want to use an instant-messaging program to communicate with their friends or colleagues while using graphics software or games which place demands on the computer. Here, a native instant-messaging client can run alongside the high-demand program without the overhead associated with a Web browser.

The same situation can apply to online games where players can see a perceived improvement in their performance. As well, it is easier for the software developer to write them to take advantage of higher-performance processing silicon. It includes designing an online game for a portable computing platform that optimises itself for either external power or battery power.

This brings me to native-client apps that are designed for a particular computing platform from the outset. One key application is to provide a user interface that is optimised for “lean-hack” operation, something that is demanded of anything that is about TV and video content. The goal often is to support a large screen viewed at a distance along with the user navigating the interface using a remote control that has a D-pad and, perhaps a numeric keypad. The remote control describes the primary kind of user interface that most smart TVs and set-top boxes offer.

Another example is software that is written to work with online file-storage services. Here, a native client for these services can be written to expose your files at the online file-storage service as if it is another file collection similar to your computer’s hard disk or removeable medium.

Let’s not forget that native-client apps can be designed to make best use of application-specific peripherals due to them directly working with the operating system. This can work well with setups that demand the use of application-specific peripherals, including the so-called “app-cessory” setups for various devices.

When an online platform is being developed, the client software developers shouldn’t forget the idea of creating native client software that works tightly with the host computer platform.

The cassette adaptor has been and is still an important audio accessory

Article

Cassette adaptor

A cassette adaptor that allows you to use your smartphone with a cassette-based car stereo

The Car Cassette Adapter Was an Unsung Hero at the Dawn of the Digital Age | VICE.com

My comments

An audio accessory that I still consider as being important and relevant even in the day of the smartphone and tablet is the cassette adaptor.

What are these cassette adaptors and how do they work?

This is a device invented by Larry Schotz during the mid 1980s to allow one to play CDs in the car using their car’s cassette player and their Discman-type portable CD player. It has a cassette-shaped housing that has a head that faces the cassette player’s playback head along with a mechanism to prevent that tape player from acting as though it’s the end of a tape side.

The head in this housing is wired to the portable audio device using a cable that is attached to the adaptor itself in a manner to cater towards different tape-loading arrangements, and plugged in to that source device via its headphone or line-out jack using the 3.5mm stereo plug. When in place, the audio content from the source device is transferred in to the cassette player’s audio electronics using a simple inductive-coupling process between the head installed in the cassette adaptor and the player’s head.

Even if the tape player ended up being mechanically defective typically by “chewing-up” tapes, the cassette adaptor was still able to work. This is because it is not reliant on tape that is at risk of being pulled out of the cassette.

As well, the same arrangement was able to work with home or portable cassette equipment like boomboxes or low-end “music centre” stereos by enabling its use with other audio sources. This was more important as the omission of a line-level audio input was seen as a way to cut costs when designing budget-priced equipment.

How did these cassette adaptors become respected audio accessories?

Cassette adaptor in use with a smartphone

A cassette adaptor being used to play a smartphone’s audio through a car cassette player

At the time this device was introduced, the cost of a car CD player was way more expensive than what a Discman-type portable player would cost and these car CD players were out of the league for most people. It was also a reality that if a person installed a car CD player or any other advanced car-audio equipment in their car during that time, they had to pay more for their vehicle’s insurance coverage and, perhaps, install a car alarm in their vehicle. This was because of a high frequency of “smash-and-grab” car break-ins where the advanced car-audio equipment was stolen from the vehicle.

For that matter, I had made sure that if I bought a Discman-type portable CD player, I would buy one of these cassette adaptors as an audio accessory for that unit. Gradually, consumer-electronics manufacturers offered Discman players with a car power adaptor and a cassette adaptor as accessories that came with the unit.

During the 1990s, the in-car CD changer became popular as an original-fitment or aftermarket car-audio option. This setup had the user place CDs in to a multiple-disc magazine which was installed in a changer unit located in the back of the car. Then the user controlled this unit using a radio-cassette player that has the ability to control the changer with the sound from the CDs emanating from the speakers associated with that unit.

But a portable CD player along with the cassette adaptor ended up being useful as a way to play another CD in these changer-based setups without having to swap out discs in the changer unit. This approach became relevant if, for example, you bought a new CD album and are eager to listen to it or have temporary use of a friend’s car but want to run your own CD-based music without worrying about discs you removed from the changer’s magazine.

The rise of MiniDisc and file-based MP3 players and, in the USA, satellite radio assured the continual relevance of these cassette adaptors as a way to play content hosted on these formats using your cassette-equipped car stereo.

Infact I was following an online discussion board about the MiniDisc format and one British member of that board, who was in a position to buy a new car, preferred a vehicle with a lower trim-level rather than a premium trim level that he could afford. In this case, the vehicle builder offered the cheaper variant of the car with a cassette player as its car-audio specification while the more expensive variant had an in-dash CD player as its only car-audio option. This is in order so the forum-participant can continue listening to MiniDiscs in the car with their MD Walkman player and cassette adaptor.

Different variants of these cassette adaptors

Ion Audio's new Bluetooth cassette adaptor

Ion Audio’s new Bluetooth cassette adaptor

There have been some variants of the cassette adaptor existing with one unit being an MP3 player that work as a stand-alone portable player along with units that worked as Bluetooth audio endpoints. This included one of these adaptors being a Bluetooth handsfree with a microphone module that was linked by wire to the cassette adaptor itself in order to facilitate phone calls or voice-assistant operation.

The Bluetooth cassette adaptors will become very relevant with newer smartphones as these forego the standard 3.5mm stereo headphone jack. Here, they use a Bluetooth link between the smartphone and the cassette adaptor fir the audio link. Let’s not forget that the ordinary cassette adaptor can be used with a full-on Bluetooth audio adaptor equipped with a 3.5mm stereo output jack on the unit itself rather than a flylead that plugs in to a 3.5mm AUX socket.

How are they relevant nowadays?

These cassette adaptors still maintain some relevance in this day and age primarily with vehicles built between the mid 1970s through the mid 1990s being welcomed in to the classic-car scene. This is very much underscored by the Japanese cars of the era acquiring a significant following amongst enthusiasts.

That same era saw the concurrent rise of the audio cassette as a legitimate mobile-audio format and car cassette players of that era represented a mature piece of in-car audio technology. Here classic-vehicle enthusiasts are preferring to keep working cassette players, preferably the original-specification units, in these newly-accepted classic vehicles. This is also about keeping the vehicles as representatives of their generation.

Similarly, there are a significant number of vehicles built from the late 1990s through the 2000s, especially in the premium sector or at higher-cost trim levels, where an integrated audio system with a CD player and cassette player is fitted in them by the vehicle builder. Here, these vehicles don’t necessarily have any auxiliary input for other audio sources and it is hard to fit aftermarket equipment in to these vehicles without doing a lot of damage to their looks and functionality.

These devices have effectively converted a car cassette player’s tape-loading slot in to an auxiliary input so other audio devices can be used in conjunction with these players especially on an ad-hoc basis.

Conclusion

The cassette adaptor has highlighted the fact that some accessories do still remain relevant to this day and age and has stood the test of time.

Smart speakers and broadcast radio

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

Smart speakers like the Amazon Echo are outselling traditional radios

The traditional radio broadcast industry are finding that the smart speaker as a threat to their business models.

This is because that there are more Amazon Echo, Google Home or similar smart speakers being bought than traditional radio sets. It is in addition to us using smartphones that don’t have traditional broadcast-radio tuners as our “go-to” information and entertainment devices.

Although these smart speakers can, at your voice command, pull up a traditional radio station thanks to TuneIn or similar Internet-radio directories, an increasing number of users are using them to summon podcasts or music playlists through the various podcast and music-on-demand services.

Pure Sensia 200D Connect Internet radio

Pure Sensia 200D Connect Internet radio – an example of how to keep the traditional radio relevant

At the moment, traditional radio whether through traditional broadcast technology or Internet streaming is primarily being listened to in the car or at businesses we frequent. It is also being seen, whether for information or entertainment, as a valid casual-listening content-source by Generation X (people born from the late 60s to the early 80s) and prior generations thanks to it being seen that way for a long time. This is due to the ubiquity of increasingly-affordable radio sets in many different form factors along with radio stations making a strong effort to keep listeners tuned to their output.

It is although advertisers and others have seen and are seeing the younger generations as “where the money is”. Here, they end up sponsoring podcasts or playlists to reach that audience with their message in order to stay relevant.

ABC Radio Podcasts

The ABC, like other traditional broadcasters, are offering their own podcasts, whether to do with an existing radio show or not

But what can be or is being done about this? At the moment, traditional radio stations are creating podcasts, whether as a byproduct of an existing radio show or as a new product. Similarly as I have experienced, most radio stations are planting their regular broadcast output on the Internet and making sure this still happens so as to work with smartphones and smart speakers. It is even though they face battles with music rightsholders and sporting leagues about international streaming rights for music or sports content.

RadioDNS “hybrid radio” has surfaced as a way to bring together traditional radio and the Internet. The key method offered by this platform is through a “single-dial” approach that provides a seamless handover between local radio frequencies / DAB multiplex locations and Internet streams for the same radio station.

Revo Domino Internet radio tuned in to Heart London

This Internet radio is tuned in to Heart London and is playing the same audio as what would be delivered on FM or DAB from the “Turn Up The Feel Good” station within the London area

Reliance on Internet audio streams as often done with smart speakers and smartphones can be problemsome if you don’t have the right kind of network and Internet connection. This represents the typical home or small-business network connected behind most home / small-business routers.

You will run in to problems with setting up a smart speaker or similar device to work with a headline public-access / guest-access Wi-Fi network that depends on Web-based authentication or having these devices work with an enterprise-grade network that uses per-device-based authentication approaches. It also includes dealing with mobile broadband services that charge an arm and a leg for continual bandwidth use but services that operate in a highly-competitive market may make this factor easier.

TuneIn Android screenshot

The stations listed on the TuneIn Internet radio app are the Internet-hosted simulcast stream of their regular radio output

Similarly broadcast-radio technology tends to appeal to listenership on battery-operated devices because the technology associated with it is optimised to work for battery efficiency. It is due to the broadcast-radio technology working on a one-way approach to receiving the radio signals rather than being dependent on a two-way transceiver demanded of Wi-Fi or mobile-broadband.

What can be done to bridge these technologies

One approach would be to have an Internet radio that also receives radio content via broadcast technologies work with at least one of the common voice-driven home assistant platforms.

This can be in the form of the radio working alongside a smart speaker based on the common platforms and using RadioDNS to pull up local radio stations under voice control.

An Internet radio can also serve as a speaker for online audio resources like on-demand music services, podcasts and Internet radio especially if the radio doesn’t have network-audio / Internet-radio functionality. The latter concept is being underscored with the Google Assistant platform where you can direct audio from an online-audio service to a device that supports the Google Chromecast protocol. Even if the radio has network-audio / Internet-radio functionality, it could be part of a voice-driven home-assistant platform, which a lot of manufacturers are heading towards and can be of relevance for the “big sets” like hi-fi systems and the network multiroom audio platforms.

A cheaper option could implement RadioDNS across a Bluetooth link with the voice-driven home assistant platform handling the RadioDNS logic. It may require the creation of a Bluetooth profile for sending RadioDNS-specific data between the radio and the smart speaker’s platform i.e. a set-appropriate pointer to the station on the broadcast bands.

It can also be about an Internet-radio / smart-speaker combination device, like the many combination devices available over the years that integrated radio reception and at least one other function. Such a set would have the ability to be an Internet radio but it would have a microphone array and a button to activate Amazon Alexa or Google Assistant, whereupon you would have the full “smart speaker” abilities of an Amazon Echo or Google Home speaker. As well, it would tie in with the RadioDNS functionality to pull up stations on the local wavebands as if you are pulling them up using the assistant’s Internet-radio functionality.

Conclusion

To keep the classic radio medium going, the manufacturers, broadcasters and other stakeholders need to look at whatever technologies can be used to make it relevant in this day and age.

Sonos dumps the device-bricking Recycle Mode

Previous HomeNetworking01.info coverage Sonos multiroom system press picture courtesy of Sonos

The Sonos debacle has raised questions about our personal tech’s life cycle

My Comments

In January, Sonos introduced the “Recycle Mode” which effectively disabled your Sonos network-multiroom-audio device after a certain number of days. It was seen as a way to detach the device from your Sonos-based network-multiroom-audio setup and wipe all of your data out of the device when you relinquish it to an e-waste recycling facility.

It was part of them establishing an end-of-feature-support rule for their older devices made prior to 2015 due to newer faster processing silicon in the newer devices. That is where older devices will only receive software-quality updates and won’t benefit from any newer functionality that Sonos releases.

But there is a reality with this kind of equipment where it is effectively “pushed down” to secondary areas as a way to build out that Sonos audio setup. As well, people do give the equipment away to family, friends and community organisations they are a part of, or sell the equipment through the second-hand market where those of us “putting our foot in the Sonos door” may buy this equipment at a cheaper price.

The social-media users were concerned about the use of that “Recycle Mode” which disabled the Sonos equipment due to it not being available for giving away or selling to the second-hand market. Sonos have answered this issue by removing the “Recycle Mode” and requiring users who are done with a particular piece of Sonos equipment to perform a factory-reset procedure (Sonos instructions) on that unit.

It is a procedure you may do if the equipment is faulty and you want to bring it to a “known quantity” as part of troubleshooting it. But performing this procedure before you relinquish the equipment effectively detaches it from your Sonos account and multi-room audio system while removing any personal configuration data from it including parameters associated with your home network.

They still have to address the issue of a Sonos audio setup consisting of legacy and newer equipment and what happens when newer features come out. The problem still raised is the fact that older equipment would preclude modern equipment from receiving functionality updates. It is although a Sonos multiroom setup will benefit from software-quality updates even if it cannot receive functionality updates.

As well, they would need to address what happens when an online media service revises their software links that enable access to their service via consumer-electronics devices. Would a software update to accommodate this revision be considered a feature-update or a software-quality update whether the result is to provide the same functionality as before or accommodate the service’s new features?

What is being called out is how a high-value network-media device with an expectedly-long service life should he maintained through its service life. It includes how long should it be supported for and what should happen towards its end-of-support time.

Google Nest Mini uses edge computing to improve search performance

Articles

Google Nest Mini smart speaker press picture courtesy of Google

The Google Nest Mini smart speaker – a follow on from the Home Mini smart speaker and having its own local processing to improve Google Assistant’s responsiveness

Google Nest Mini gets louder and gains onboard Assistant processing | SlashGear

Google debuts Nest Mini with wall mount and dedicated ML chip | VentureBeat

From the horse’s mouth

Google

Nest Mini

Nest Mini brings twice the bass and an upgraded Assistant (Product Blog Post)

My Comments

The Google Nest Mini smart speaker, which is the successor to the Google Home Mini smart speaker, shows up a significant number of improvements including a richer sound. But it has also come about with the idea of locally processing your voice commands for better Google Assistant performance.

The traditional approach to processing voice commands that are said to a smart speaker or similar device is for that device to send them out as a voice recording to the cloud servers that are part of the voice-driven assistant platform. These servers then implement their artificial-intelligence and machine-learning technology to strip background noise, interpret the commands and supply the appropriate replies or actions back to that device.

But Google has improved on this by using a leaf out of the book associated with edge-computing technology. This is where some of the data storage or processing is performed local to the user before the data is sent to a cloud computing system. Here, Google uses a dedicated machine-language processor chip in their Nest Mini smart speaker to do some of the command processing before sending data about the user’s command to the Google Assistant cloud system.

It reduces the idea of your Google Nest Mini smart speaker being a simple conduit between your home network and the Google Assistant cloud. The key benefit is that you see a quicker response from the Google Assistant via that device. You also have the benefit of reducing the Internet bandwidth associated with handling the voice-driven home assistant activity, avoiding reduced performance for online gaming or multimedia streaming.

Google is working on taking this further with having Google-Assistant-based devices that have this kind of local processing process logic associated with user requests and programmable actions locally. It also includes keeping the logic associated with the Assistant liaising with other smart devices local to your home network, allowing for improvements to performance, user privacy and data security.

It could be seen by Amazon and others as a way to improve the performance of their voice-driven home-assistant platforms. This is more so where the competition between these platforms becomes more keen. As well, there could be a chance for third-party Google Assistant (Home) implementations to look towards using local processing to improve the Assistant’s response.

An issue that will crop up is having multiple devices that have this kind of local processing existing on the same home network help each other to increase the voice-driven assistant’s performance. This can also include using a software approach to make the devices equipped with the local processing provide improved performance for those that don’t have this processing. It will be an issue with the likes of Google Nest Mini and similar entry-level devices that appeal to the idea of having many installed around the house, along with the idea of equipping smart displays with this kind of local processing.

What I see of this is that the use of edge-computing technology is coming to the fore as far as improving responsiveness in the common voice-driven home-assistant platforms.

Using Google Assistant as part of an in-home-care service

Article

The Google Home now part of ageing-at-home and working with a home healthcare service

Feros Care plugs into Google Assistant to boost seniors’ independence | IT News]

My Comments

The technology industry is working on making themselves relevant to the “ageing-at-home” sector where senior citizens, including the ageing Baby Boomer population, can live in their own homes or in supported accommodation but preserve their own privacy and dignity. But the goal of improved dignity for these seniors includes using the technology that doesn’t look out of place in an ordinary home environment.

This system, ran by Feros Care, implements Google Assistant technology as a base platform and uses Google Home smart-speaker devices as a voice-driven interface with the client who the agency is looking after. It also facilitates visual display through the Android TV smart-TV platform and the Google Home Hub smart display.

This is facilitated through the development of Google Actions and DialogFlow natural-language processing with some custom application-programming-interface (API) software “hooks” to work with the agency’s MyFeros IT portal. It provides the client access access to details about carer appoints, further assistance amongst other things while the MyFeros portal captures service-provider to client interactions.

It is more about allowing senior citizens who use this agency for assisted living to manage their experience with the agency themselves and maintain their independence.

The use of the Google Home / Assistant voice-interaction technology can work around situations where the senior has had a fall and cannot gain access to the phone to summon help. Similarly it works well when they are recovering in bed and don’t have a tablet or phone at their bedside. The Android TV / Home Hub smart-TV technology can be used to show up visual information like details of alternate carers who are “filling in” for a regular carer who is ill or on leave and cannot attend

Even smart-lock technology is coming in to play in order to allow staff who are rostered on to care for a particular client access to that client’s home for the duration of their shift. This is due to older people with limited mobility taking a long time to reach their front door to admit the carer in to their home. The smart-lock integration will also work in hand with “visit-verification” requirements that will be demanded within the home-based healthcare industry thanks to various health-insurance or public-healthcare requirements.

Feros Care underscores that the technology is not about staff efficiency and productivity by to serve the needs of their service’s end-users and protect their dignity and independence.

But what I like about this approach is that they aren’t reinventing the wheel in implementing this technology and having to implement new devices for their field of work. Rather they use common “horizontal-market” technology like Google-Home-compatible smart speakers and smart displays compliant with Google’s smart-display technologies – such equipment able to be purchased “off the shelf” at any consumer electronics outlet and blend in to an ordinary home.

I also see Feros Care in a position to offer the necessary software logic as a “white-label” solution for all sorts of home healthcare agencies, supported-housing facilities and the like who want to implement it in their client-carer IT-portal setups. But there will be issues like adapting to other consumer-focused voice-driven home assistant platforms like Alexa, along with making it work with the widest range of home-automation devices.

Here, it is about implementing whatever common home-networking technology as part of assisted-living simply through using software to provide this kind of integration.

Reverse image searching–a very useful tool for verifying the authenticity of content

Tineye reverse image search

Tineye – one of the most popular and useful reverse image search tools

Article

How To Do A Reverse Image Search From Your Phone | PCMag

My Comments and further information

Increasingly, most of us who regularly interact with the Internet will be encouraged to perform reverse-image searches.

This is where you use an image you supply or reference as a search term for the same or similar images on other Internet resources. It can also be about identifying a person or other object that is in the image.

Increasingly this is being used by people who engage in online dating to verify the authenticity of the person whom they “hit” on in an online-dating or social-media platform. It is due to romance scams where “catfishing” (pretending to be someone else in order to attract people of a particular kind) is part of the game. Here, part of the modus operandi is for the perpetrator to steal pictures of other people that match a particular look from photo-sharing or social-media sites and use these images in their profile.

It also is being used as a way to verify the authenticity of a product being offered for sale through an online second-hand-goods marketplace like eBay, Craigslist or Gumtree. It also extends to short-term house rentals including AirBnB where the potential tenant wants to verify the authenticity of the premises that is available to let.

As well, reverse image searching is being considered more relevant when it comes to checking the veracity of a news item that is posted online. This is very important in the era of fake news and disinformation where online images including doctored images are being used to corroborate questionable news articles.

How do you do a reverse image search?

At the moment, there are a few reverse-image-search engines that are available to use by the ordinary computer user. These include Tineye, Google Image Search, Bing Visual Search, Yandex’s image search function and Social Catfish’s reverse-image-search function.

Dell Inspiron 14 5000 2-in-1 at Rydges Melbourne (Locanda)

A regular computer like this Dell Inspiron 14 5000 2-in-1 makes it easier to do a reverse image search thanks to established operating system and browser code and its user interface.

The process of using these services involves you uploading the image to the service including using “copy-and-paste” techniques or passing the image’s URL to an address box in the search engine’s user interface. The latter method implies a “search-by-reference” method with the reverse-image-search site loading the image associated with that link into itself as its search term.

Using a regular desktop or laptop computer that runs the common desktop operating systems makes this job easier. This is because the browsers offered on these platforms implement tabs or allow multiple sessions so you can run the site in question in one tab or window and one or two reverse-image-search engines in other tabs or windows.

These operating systems also maintain well-developed file systems and copy-paste transfer algorithms that facilitate the transfer of URLs or image data to these reverse-image-search engines. That will also apply if you are dealing with a native app for that online service such as the client app offered by Facebook or LinkedIn for Windows. As well, Chrome and Firefox provide drag-and-drop support so you can drag the image from that Tinder or Facebook profile in one browser session to Tineye running in the other browser session.

But mobile users may find this process very daunting. Typically it requires the site to be opened and logged in to in Chrome or Safari then opened as a desktop version which is the equivalent of viewing it on a regular computer. For Chrome, you have to tap on the three-dot menu and select “Request Desktop Site”. For Safari, you have to tap the upward-facing arrow to show the “desktop view” option and select that option.

Then you open the image in a new tab and copy the image’s URL from the address bar. That is before you visit Google Image Search or Tineye to paste the URL in that app’s interface.

Google has built in to recent mobile versions of Chrome a shortcut to their reverse-image-search function. Here, you “dwell” on the image with your finger to expose a pop-up menu which has the “Search Google For This Image” option. The Bing app has the ability for you to upload images or screenshots for searching.

Share option in Google Chrome on Android

Share option in Google Chrome on Android

If you use an app like the Facebook, Instagram or Tinder mobile clients, you may have to take a screenshot of the image you want to search on. Recent iOS and Android versions also provide the ability to edit a screenshot before you save it thus cutting out the unnecessary user-interface stuff from what you want to submit. Then you open up Tineye or Google Image Search in your browser and upload the image to the reverse-image-search engine.

How can reverse image searching on the mobile platforms be improved

What can be done to facilitate reverse image searching on the mobile platforms is for reverse-image-search engines to create lightweight apps for each mobile platform. This app would make use of the mobile platform’s “Share” function for you to upload the image or its URL to the reverse-image-search engine as a search term. Then the app would show you the results of your search through a native interface or a view of the appropriate Web interface.

Share dialog on Android

A reverse-image-search tool like Tineye could be a share-to destination for mobile platforms like iOS or Android

Why have this app work as a “share to” destination? This is because most mobile-platform apps and Web browsers make use of the “share to” function as a way to take a local or online resource further. It doesn’t matter whether it is to send to someone else via a messaging platform including email; obtain a printout or, in some cases, stream it on the big screen via AirPlay or Chromecast.

The lightweight mobile app that works with a reverse-image-search engine answers the reality that most of us use smartphones or mobile-platform tablets for personal online activity. This is more so with social media, online dating and online news sources, thanks to the “personal” size of these devices.

Conclusion

What is becoming real is reverse image searching, whether of particular images or Webpages, is being seen as important for our security and privacy and for our society’s stability.

Keeping the same character within your online community

Article

Facebook login page

Online communities do represent a lot of hard work and continuous effort including having many moderators

General Election 2019: Has your local Facebook group been hijacked by politics? | BBC News

My Comments

The past UK General Election highlighted an issue with the management of online communities, especially those that are targeted at neighbourhoods.

In the BBC News article, a local Facebook group that was used by a neighbourhood specifically for sharing advice, recommending businesses, advertising local events, “lost-and-found” and similar purposes was steered from this purpose to a political discussion board.

You may or may not think that politics should have something to do with your neighbourhood but ordinarily, it stays very well clear. That is unless you are dealing with a locally-focused issue like the availability of publicly-funded services like healthcare, education or transport infrastructure in your neighbourhood. Or it could be about a property development that is before the local council that could affect your neighbourhood.

How that came about was that it was managed by a single older person who had passed away. Due to the loss of an administrator, the group effectively became a headless “zombie” group where there was no oversight over what was being posted.

That happened as the UK general election was around the corner with the politics “heating up” especially as the affected neighbourhood was in a marginal electorate. Here, the neighbourhood newsgroup “lost it” when it came to political content with the acrimony heating up after the close of polls. The site administrator’s widow even stated that the online group was being hijacked by others pushing their own agendas.

Subsequently, several members of that neighbourhood online forum stepped in to effectively wrest control and restore sanity to it. This included laying down rules against online bullying and hate speech along with encouraging proper decent courtesy on the bulletin board. It became hard to effectively steer back the forum to that sense of normalcy due to pushback by some members of the group and the established activity that occurred during the power vacuum.

This kind of behaviour, like all other misbehaviour facilitated through the Social Web and other Internet platforms, exploits the perceived distance that the Internet offers. It is something you wouldn’t do to someone face-to-face.

What was being identified was that there was a loss of effective management power for that online group due to the absence of a leader which maintained the group’s character and no-one effectively steps up to fill the void. This can easily happen with any form of online forum or bulletin board including an impromptu “group chat” set up on a platform like WhatsApp, Facebook Messenger or Viber.

It is like a real-life situation with an organisation like a family business where people have put in the hard yards to maintain a particular character. Then they lose the effective control of that organisation and no-one steps up to the plate to maintain that same character. This kind of situation can occur if there isn’t continual thought about succession planning in that organisation’s management especially if there aren’t any young people in the organisation who are loyal to its character and vision.

An online forum should have the ability and be encouraged to have multiple moderators with the same vision so others can “take over” if one isn’t able to adequately continue the job anymore. Here, you can discover and encourage potential moderators through their active participation online and in any offline events. But you would need to have some people who have some sort of computer and Internet literacy as moderators so they know their way around the system or require very minimal training.

The multiplicity of moderators can cater towards unforseen situations like death or sudden resignation. It also can assure that one of the moderators can travel without needing to have their “finger on the pulse” with that online community. In the same vein, if they or one of their loved ones falls ill or there is a personal calamity, they can concentrate on their own or their loved one’s recovery and rehabilitation or managing their situation.

There will be a reality that if a person moves out of a neighbourhood in good faith, they will have maintained regular contact with their former neighbours. Here they would be trying to keep their “finger on the pulse” regarding the neighbourhood’s character.  This fact can be exploited with managing a neighbourhood-focused online community by them being maintained as a “standby moderator” where they can be “roped in” to moderate the online community if there are too few moderators.

To keep the same kind of “vibe” within that online community that you manage will require many hands at the pump. It is not just a one-person affair.